SlideShare una empresa de Scribd logo
1 de 75
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
AWS Security Fundamentals
Fatima Ahmed
Technical Account Manager
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Welcome!
AND
Move	Fast
Stay	Secure
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Making	life	easier
• Choosing	security	does	not	mean	giving	up	on	
convenience or	introducing	complexity
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Security	ownership	as	part	of	DNA
• Promotes	culture	of	“everyone	is	an	owner”	for	security
• Makes	security	a	stakeholder	in	business	success
• Enables	easier	and	smoother	communication
Distributed Embedded
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Strengthen your	security	posture
Get	native	functionality	and	tools
Over	30	global	compliance
certifications	and	accreditations
Leverage	security	enhancements	gleaned	
from	1M+	customer	experiences
Benefit	from	AWS	industry	leading	
security	teams	24/7,	365	days	a	year
Security	infrastructure	built	to	
satisfy	military,	global	banks,	and	other	
high-sensitivity	organizations
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Why	is	Security	Traditionally	Hard?
Lack	of	visibility Low	degree	of	automation
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
New	Tools	in	Your	Toolbox	– Security	Controls
• Directive
• Preventive	
• Detective
• Responsive
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Security	Controls
• Responsive	Controls
• Directive	Controls
• Preventive	Controls
• Detective	Controls
Understand	AWS	Security	Practice
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Prescriptive	Approach
Understand	
AWS
Security	
Practice
Build	Strong	
Compliance	
Foundations
Integrate	Identity	
&	Access	
Management
Enable	
Detective	
Controls
Establish	
Network	
Security
Implement	
Data	
Protection
Optimize	
Change	
Management
Automate	
Security	
Functions
https://aws.amazon.com/security/security-resources
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure
Regions
Availability	Zones
Edge	
Locations
Client-side	Data	
Encryption
Server-side	Data	
Encryption
Network	Traffic	
Protection
Platform,	Applications,	Identity	&	Access	Management
Operating	System,	Network	&	Firewall	Configuration
Customer	content
Customers
Security	is	a	shared	responsibility
Customers	are	
responsible	for	
their	security	IN
the	Cloud
AWS	is	
responsible	for	
the	security	OF
the	Cloud
Build	Strong	Compliance	
Foundations
AWS	Shared	Responsibility	Model
Facilities
Physical	security
Compute	infrastructure
Storage	infrastructure
Network	infrastructure
Virtualization	layer	(EC2)
Hardened	service	endpoints
Rich	IAM	capabilities
Network	configuration
Security	groups
OS	firewalls
Operating	systems
Applications
Proper	service	configuration
AuthN &	acct	management
Authorization	policies
+ =
Customer	
Controls
• Scope	of	responsibility	depends	on	the	type	of	service	offered	by	AWS:	Infrastructure,	
Container,	Abstracted	Services
• Understanding	who	is	responsible	for	what	is	critical	to	ensuring	your	AWS	data	and	systems	
are	secure!
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Broad	Accreditations	&	Certifications
https://aws.amazon.com/compliance/dod/
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure Regions
Availability	
Zones Edge	
Locations
Your	own	
accreditation
Meet	your	own	security	objectives
Your	own	
certifications
Your	own	
external	audits
Customer	scope	and	
effort	is	reduced
Better	results	through	
focused	efforts
Built	on	AWS	consistent	
baseline	controls
Your	ControlsAWS
https://d0.awsstatic.com/whitepapers/compliance/AWS_DOD_CSM_Reference_Architecture.pdf
AWS Global Infrastructure
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Directive	Controls
Establish the governance, risk, and compliance models the environment will
operate
Account	Governance	&	Ownership
AWS
Organizations
AWS	
IAM
Centrally	manage	multiple	accounts	to	help	you	scale.	
• control	which	AWS	services	are	available	to	individual	accounts
• automate	new	account	creation
• easily	manage	security	and	automation	settings
Securely	control	access	to	AWS	services	and	resources	for	
your	users.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Identity	&	Access	Management
IAM	Users IAM	Groups IAM	Roles IAM	Policies
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Account	Governance	– New	Accounts
InfoSec’s	
Cross-
Account	
Roles
AWS	Account	
Credential	
Management
(“Root	Account”)
Federation
Baseline	Requirements
Actions	&
Conditions
Map	
Enterprise	
Roles
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Preventive	Controls
Protect your workloads and mitigate threats and vulnerabilities
Infrastructure	Protection
Amazon	
VPC
AWS
CloudFormation
AWS
OpsWorks
security	
group
AWS	WAF
AWS	
Shield
Virtual	firewall	that	
controls	the	traffic	for	
one	or	more	resources.
Easily	create	and	
manage	a	collection	of	
related	AWS	resources,	
provisioning	and	
updating	them	in	an	
orderly	and	predictable	
fashion
Automate	how	servers	
are	configured,	
deployed,	and	
managed.
Provision	a	logically	isolated	
section	of	AWS	cloud	where	you	
can	launch	AWS	resources	in	a	
virtual	network	that	you	define.
DDoS	protection	service	that	
safeguards	web	applications	
running	on	AWS
Protect	your	web applications	
from	common	web	exploits	that	
could	affect	
application availability,	
compromise	security,	or	consume	
excessive	resources
R e s o u r c e s N e t w o r k
Security	Groups
VPC	Public	Subnet	10.10.1.0/24 VPC	Public	Subnet	10.10.2.0/24
VPC	CIDR		10.10.0.0/16
VPC	Private	Subnet	10.10.3.0/24 VPC	Private	Subnet	10.10.4.0/24
VPC	Private	Subnet	10.10.5.0/24 VPC	Private	Subnet	10.10.6.0/24
AZ A AZ B
Public	ELB
Internal	ELB
RDS
Master
Autoscaling
Web	Tier
Autoscaling
Application	Tier
Internet
Gateway
RDS
Standby
Snapshots
Multi-AZ	RDS
Data	Tier
Existing
Datacenter
Virtual
Private
Gateway
Customer
Gateway
VPN	Connection
Direct	Connect
Network
Partner
Location
Administrators	&
Corporate	Users
Amazon	Virtual	Private	Cloud
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
DDoS	protections	built	into	AWS
• Protection	against	most	common	
infrastructure	attacks
• SYN/ACK	Floods,	UDP	Floods,	Refection	
attacks	etc.
• No	additional	cost
DDoS mitigation
systems
DDoS Attack
Users
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Advanced	DDoS	protection
Layer	7	
application
protection
Layer	3/4	
infrastructure	
protection
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Layer	3/4	infrastructure	protection
• Advanced	mitigation	techniques
Deterministic	
filtering
Traffic	prioritization	
based	on	scoring	
Advanced	routing	
policies
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	WAF	– Layer	7	application	protection
Web traffic filtering
with custom rules
Malicious request
blocking
Active monitoring
and tuning
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Shield Standard
• Free of Cost
• Network Flow monitoring
• Quick Detection
• Inline Attack Mitigation
• DDoS protection best practices/architecture review
• Instant rule updates using Web Application Firewall (WAF)
Protection	against	most	common	DDoS	attacks,	and	access	to	tools	and	best	
practices	to	build	a	DDoS	resilient	architecture.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Shield Advanced
• Application Traffic monitoring
• Additional DDoS mitigation capacity for large attacks
• Layer 3 / Layer 4 attack notification
• Layer 3 / Layer 4 / Layer 7 attack historical report
• Custom mitigations during attacks
• Post attack analysis
• DRT-driven application layer (Layer 7) mitigations
• Currently available to only Business and Enterprise Support customers
Additional	protection	against	larger	and	more	sophisticated	attacks,	visibility	into	
attacks,	and	24X7	access	to	DDoS	experts	for	complex	cases.
Data	Protection
• Deep integration
with AWS Services
• CloudTrail
• AWS SDK for
application
encryption
AWS KMSAmazon CloudHSM
• Dedicated HSM
• Integrate with on-
premises HSMs
• Hybrid Architectures
AWS	Certificate	Manager
• Provision,	manage,	
and	deploy	TLS	
certificates
• Use	with	Amazon	ELB	
or	Amazon	CloudFront
distribution
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Authenticating	AWS	to	you	and	protecting	
confidentiality	using	TLS
• TLS can be used with every AWS API to protect data upload/download and
configuration change
• You can provide your own certificates to be presented to your customers
when using:
• Elastic Load Balancing
• Amazon CloudFront (content distribution network)
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Certificate	Manager	(ACM)
• Provision trusted SSL/TLS certificates from AWS for use with AWS
resources:
– Elastic Load Balancing
– Amazon CloudFront distributions
• AWS handles the muck
– Key pair and CSR generation
– Managed renewal and deployment
• Domain validation (DV) through email
• Available through AWS Management Console, AWS Command
Line Interface (AWS CLI), or API
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Options	for	using	encryption	in	AWS
Client-side encryption
• You encrypt your data before data submitted to service
• You supply encryption keys OR use keys in your AWS account
• Available clients:
• S3, EMR File System (EMRFS), DynamoDB, AWS Encryption SDK
Server-side encryption
• AWS encrypts data on your behalf after data is received by service
• 19 integrated services including S3, Snowball, EBS, RDS, Amazon Redshift,
WorkSpaces, Amazon Kinesis Firehose, CloudTrail
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Key	Management	Service
Customer	Master
Key(s)
Data	Key	1
Amazon	
S3	Object
Amazon	EBS	
Volume
Amazon	
Redshift	
Cluster
Data	Key	2 Data	Key	3 Data	Key	4
Managed	service	to	securely	create,	control,	rotate,	and	use	
encryption	keys.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	CloudHSM
AWS
CloudHSM
AWS Administrator –
manages the appliance
You – control keys and
crypto operations
Amazon Virtual Private Cloud
Help	meet	compliance	requirements	for	data	security	by	using	a	dedicated	Hardware	
Security	Module	appliance	with	AWS.
• Dedicated,	single-tenant	hardware	device
• Can	be	deployed	as	HA	and	load	balanced
• Customer	use	cases:
• Oracle	TDE
• MS	SQL	Server	TDE
• Setup	SSL	connections
• Digital	Rights	Management	(DRM)
• Document	Signing
CloudHSM
• Dedicated access to one or more HSM
devices that comply with government
standards (for example, FIPS 140-2,
Common Criteria)
• You control all access to your keys and
the application software that uses them
• Supported applications:
– Your custom software
– Third-party software
– AWS services: Amazon Redshift, RDS for Oracle
Comparing	CloudHSM	with	KMS
KMS
• Highly available and durable key storage,
management, and auditable service
• Allows you to import keys
• Easily encrypt your data across AWS
services and within your own applications
based on policies you define
• Supported applications:
– Your custom software built with AWS SDKs/CLI
– AWS services (S3, EBS, RDS, Amazon Aurora,
Amazon Redshift, WorkMail, WorkSpaces,
CloudTrail, Elastic Transcoder)
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Ubiquitous	encryption
EBS
RDS
Amazon
Redshift
S3
Amazon
Glacier
Encrypted	in	transit
AWS CloudTrail
IAM
Fully	auditable
Restricted	access
and	at	rest
Fully	managed
keys	in	KMS
Imported
keys
Your KMI
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Break
Database	security	with	Amazon	RDS
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Database	security
Commercial solutions through Amazon RDS:
Amazon
DynamoDB
Amazon
Redshift
Amazon
Aurora
AWS Database
Migration Service
Amazon	database	solutions:
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	database	services	and	encryption	at	rest
Server-side encryption with KMS
RDS MySQL
RDS PostgreSQL
RDS SQL Server
RDS Oracle
RDS MariaDB
Amazon Aurora
Amazon Redshift
Server-side encryption with CloudHSM
Amazon Redshift
RDS Oracle TDE
Microsoft SQL TDE
Client-side encryption for
row/column/field-level protection
DynamoDB encryption client
Build your own with AWS SDK
third-party solutions
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	data	platforms	- IAM	and	CloudTrail
• API permissions
• Enforce separation of duties
• Resource-based permissions
• Use tags by environment
• Integrated with CloudTrail
• Alert on key management activities
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Preventive	Controls
{
"Version":	"2012-10-17",
"Id":	"key-consolepolicy-2",
"Statement":	[
{
"Sid":	"Enable	IAM	User	Permissions",
"Effect":	"Allow",
"Principal":	{"AWS":	"arn:aws:iam::111122223333:root"},
"Action":	"kms:*",
"Resource":	"*"
},
{
"Sid":	"Allow	access	for	Key	Administrators",
"Effect":	"Allow",
"Principal":	{"AWS":	[
"arn:aws:iam::111122223333:user/KMSAdminUser",
"arn:aws:iam::111122223333:role/KMSAdminRole"
]},
"Action":	[
"kms:Create*",
"kms:Describe*",
"kms:Enable*",
"kms:List*",
"kms:Put*",
"kms:Update*",
"kms:Revoke*",
"kms:Disable*",
"kms:Get*",
"kms:Delete*",
"kms:TagResource",
"kms:UntagResource",
"kms:ScheduleKeyDeletion",
"kms:CancelKeyDeletion"
],
"Resource":	"*"
},
{
"Sid":	"Allow	use	of	the	key",
"Effect":	"Allow",
"Principal":	{"AWS":	[
"arn:aws:iam::111122223333:user/KMSUser",
"arn:aws:iam::111122223333:role/KMSRole",
"arn:aws:iam::444455556666:root"
]},
"Action":	[
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncrypt*",
"kms:GenerateDataKey*",
"kms:DescribeKey"
],
"Resource":	"*"
},
{
"Sid":	"Allow	attachment	of	persistent	resources",
"Effect":	"Allow",
"Principal":	{"AWS":	[
"arn:aws:iam::111122223333:user/KMSUser",
"arn:aws:iam::111122223333:role/KMSRole",
"arn:aws:iam::444455556666:root"
]},
"Action":	[
"kms:CreateGrant",
"kms:ListGrants",
"kms:RevokeGrant"
],
"Resource":	"*",
"Condition":	{"Bool":	{"kms:GrantIsForAWSResource":	"true"}}
}
]
Allows	the	AWS	account	(root	user)	
111122223333	full	access	to	the	CMK,	and	
thus	enables	IAM	policies	in	the	account	to	
allow	access	to	the	CMK.	
Allows	IAM	user	KMSAdminUser and	IAM	
role	KMSAdminRole to	administer	the	CMK.	
Allows	IAM	user	KMSUser,	IAM	role	
KMSRole,	and	AWS	account	444455556666	
to	use	the	CMK.
Responsive	Controls
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Track,	detect,	and	take	action
Tracking
• AWS Config rules
• Amazon CloudWatch Events
• AWS CloudTrail
• Amazon Inspector
Coordination
• Amazon SWF
• AWS CodePipeline
Execution
• AWS Lambda
Securing
• MFA
• IAM policies
Track/log
• Amazon CloudWatch Logs
• Amazon DynamoDB
Alert
• Amazon SNS
…
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
• You have options to implement data controls that meet your business needs
• Take advantage of managed services, and let us do the heavy lifting
• Protect your data but also track, detect, and take action on changes and events
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Detective	Controls
Full visibility and transparency over the operation of your deployments in
AWS
VISIBILITY
AWS
CloudTrail
AWS
Config
Amazon	
CloudWatch
Amazon	
Inspector
Flow	
logs
Web	service	that	records	
AWS	API	calls	for	your	
account	and	delivers	log	
files	to	you.
Monitoring	service	for	
AWS	cloud	resources	and	
the	applications	you	run	
on	AWS.	
- collect	and	track	
metrics
- collect	and	monitor	log	
files
- set	alarms
- automatically	react	to	
changes	in	your	AWS	
resources
Resource	inventory,	
configuration	history,	
and	configuration	
change	notifications	to	
enable	security	and	
governance
Automatically	assesses	
applications	for	
vulnerabilities	or	
deviations	from	best	
practices
Capture	information	about	the	IP	
traffic	going	to	and	from	network	
interfaces	in	your	VPC.
Account Resources Network
Stream	of	
configuration	items	
for	all	changes
Collection	of	
configuration	items	
for	all	resources
Configuration	items	
can	be	viewed	as	a	
history
record	configuration	
changes
AWS	Config
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Config
VPC	Flow	Logs
• Agentless
• Enable	per	ENI,	per	subnet,	or	per	VPC
• Logged	to	AWS	CloudWatch	Logs
• Create	CloudWatch	metrics	from	log	data
• Alarm	on	those	metrics
AWS
account
Source	IP
Destination	IP
Source	port
Destination	port
Interface Protocol Packets
Bytes Start/end	time
Accept	or	
reject
VPC	Flow	Logs
• Amazon	
Elasticsearch
Service
• Amazon	
CloudWatch	
Logs	
subscriptions
VPC	Flow	Logs	– CloudWatch Alarms
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Responsive	Controls
Drive remediation of potential deviations from your security baselines
AUDITABILITY
AWS	
Config	
rule
AWS	Trusted	Advisor
Config Rules	enables	you	to	create	rules	that	automatically	
check	the	configuration	of	AWS	resources	recorded	by	AWS	
Config.	
Trusted	Advisor	provides	real	time	
guidance	to	help	you	provision	your	
resources	following	AWS	best	
practices.	
- reduce	cost
- increase	performance
- improve	security
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Config &	Config Rules
AWS
Config
Amazon	
Config Rules
ü Record	configuration	changes	
continuously
ü Time-series	view	of	resource	changes
ü Archive	&	Compare
ü Enforce	best	practices
ü Automatically	roll-back	unwanted	
changes
ü Trigger	additional	workflow
AWS Trusted Advisor
Core Checks and Recommendations
Access	to	the	six	core	Trusted	Advisor	checks	to	help	increase	the	security	and	
performance	of	your	environment.	
Checks	include:
Security:	Security	Groups	- Specific	Ports	Unrestricted,	IAM	Use,	MFA	on	Root	
Account,	EBS	Public	Snapshots,	RDS	Public	Snapshots
Performance:	Service	Limits
Available	to	all	AWScustomers
Available	with	Business	or	Enterprise	support	plans
Core Checks and Recommendations
Access	to	the	full	set	of	Trusted	Advisor	checks	to	help	optimize	your	entire	AWS	
infrastructure.
Additional	benefits	include:
Notifications:	Stay	up-to-date	with	your	AWS	resource	deployment	with	weekly	
updates.
Programmatic	access:	Retrieve	and	refresh	Trusted	Advisor	results	
programmatically	using	AWS	Support	API.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Config Rules – Enforce Volume Encryption
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Config Rules	– Evaluation	Results
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Artifact
• Audit and compliance portal for on-demand access to download AWS’ compliance reports and
manage select agreements for ISO, PCI, SOC, and other regulatory standards.
• Benefits:
– Reports On-Demand
– Globally Available
– Easy Identification
– Quick Assessments
– Continuous Monitoring
– Enhanced Transparency
Automate Security Functions
Evolving	the	Practice	of	Security	Architecture
• Security architecture as a separate function can no longer exist
• Static position papers,
architecture diagrams &
documents
• UI-dependent consoles
and technologies
• Auditing, assurance,
and compliance are
decoupled, separate
processes
Current Security
Architecture
Practice
Evolving	the	Practice	of	Security	Architecture
• Security architecture can now be part of the ‘maker’ team
• Architecture artifacts
(design choices,
narrative, etc.)
committed to common
repositories
• Complete solutions
account for automation
• Solution architectures
are living
audit/compliance
artifacts and evidence
in a closed loop
Evolved Security
Architecture
Practice
AWS	
CodeCommit
AWS	
CodePipeline Jenkins
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	CloudFormation – Infrastructure	as	Code
Template StackAWS
CloudFormation
• Orchestrate	changes	across	AWS	
Services
• Use	as	foundation	to	Service	Catalog	
products
• Use	with	source	code	repositories	to	
manage	infrastructure	changes
• JSON-based	text	file	describing	
infrastructure
• Resources	created	
from	a	template
• Can	be	updated
• Updates	can	be	
restricted
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Change	Sets	– Create	Change	Set
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Change	Sets
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Change	Sets
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Marketplace	Security	Partners
Infrastructure
Security
Logging &
Monitoring
Identity &
Access Control
Configuration &
Vulnerability
Analysis
Data
Protection
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Security	is	a	service	team,	not	a	blocker
Security	is	everyone's	job
Allow	flexibility	and	freedom
but	control	the	flow	and	result.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS
Thank	You

Más contenido relacionado

La actualidad más candente

An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응Amazon Web Services Korea
 
[AWS Builders 온라인 시리즈] AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트
[AWS Builders 온라인 시리즈]  AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트[AWS Builders 온라인 시리즈]  AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트
[AWS Builders 온라인 시리즈] AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트Amazon Web Services Korea
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneAmazon Web Services
 
Following Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfFollowing Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfAmazon Web Services
 
Introduction to Amazon Elasticsearch Service
Introduction to  Amazon Elasticsearch ServiceIntroduction to  Amazon Elasticsearch Service
Introduction to Amazon Elasticsearch ServiceAmazon Web Services
 
Large-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSCLarge-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSCAmazon Web Services
 
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...Amazon Web Services Korea
 
How To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWSHow To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWSAmazon Web Services
 
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
Elastic  Load Balancing Deep Dive - AWS Online Tech TalkElastic  Load Balancing Deep Dive - AWS Online Tech Talk
Elastic Load Balancing Deep Dive - AWS Online Tech TalkAmazon Web Services
 
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안BESPIN GLOBAL
 

La actualidad más candente (20)

An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응[AWS Builders] AWS상의 보안 위협 탐지 및 대응
[AWS Builders] AWS상의 보안 위협 탐지 및 대응
 
[AWS Builders 온라인 시리즈] AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트
[AWS Builders 온라인 시리즈]  AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트[AWS Builders 온라인 시리즈]  AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트
[AWS Builders 온라인 시리즈] AWS 서비스를 활용하여 파일 스토리지 빠르게 마이그레이션 하기 - 서지혜, AWS 솔루션즈 아키텍트
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
 
AWS Containers Day.pdf
AWS Containers Day.pdfAWS Containers Day.pdf
AWS Containers Day.pdf
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
 
Following Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdfFollowing Well Architected Frameworks - Lunch and Learn.pdf
Following Well Architected Frameworks - Lunch and Learn.pdf
 
Introduction to Amazon Elasticsearch Service
Introduction to  Amazon Elasticsearch ServiceIntroduction to  Amazon Elasticsearch Service
Introduction to Amazon Elasticsearch Service
 
Large-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSCLarge-Scale AWS Migrations with CSC
Large-Scale AWS Migrations with CSC
 
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...
만들자! 데이터 기반의 스마트 팩토리 - 문태양 AWS 솔루션즈 아키텍트 / 배권 팀장, OCI 정보통신 :: AWS Summit Seou...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
How To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWSHow To Modernize Enterpize Apps, Including Windows and .NET on AWS
How To Modernize Enterpize Apps, Including Windows and .NET on AWS
 
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
Elastic  Load Balancing Deep Dive - AWS Online Tech TalkElastic  Load Balancing Deep Dive - AWS Online Tech Talk
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
 
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안
[AWS & 베스핀글로벌, 바이오∙헬스케어∙제약사를 위한 세미나] AWS 클라우드 보안
 

Similar a AWS Security Fundamentals

Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Amazon Web Services
 
Introduction to Security and AWS Storage
Introduction to Security and AWS StorageIntroduction to Security and AWS Storage
Introduction to Security and AWS StorageAmazon Web Services
 
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksCloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksAmazon Web Services
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Amazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsBela Sojina MBA, PMP
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAmazon Web Services
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWSAmazon Web Services
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert LogicAmazon Web Services
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
 

Similar a AWS Security Fundamentals (20)

Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
 
Introduction to Security and AWS Storage
Introduction to Security and AWS StorageIntroduction to Security and AWS Storage
Introduction to Security and AWS Storage
 
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksCloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 
Come costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSCome costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 
Come costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSCome costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWS
 

AWS Security Fundamentals